<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Timestamp-Manipulation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/timestamp-manipulation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 21:16:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/timestamp-manipulation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Nimiq Blockchain Timestamp Manipulation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nimiq-timestamp-inflation/</link><pubDate>Thu, 09 Apr 2026 21:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nimiq-timestamp-inflation/</guid><description>A vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.</description><content:encoded><![CDATA[<p>Nimiq-blockchain, which provides persistent block storage for Nimiq&rsquo;s Rust implementation, is susceptible to a critical vulnerability. In versions 1.3.0 and earlier, the block timestamp validation lacks an upper bound check against the wall clock. This flaw enables a malicious block-producing validator to set block timestamps to an arbitrarily distant future. The vulnerability directly impacts reward calculations within the blockchain, specifically through <code>Policy::supply_at()</code> and <code>batch_delay()</code> in <code>blockchain/src/reward.rs</code>. By manipulating these timestamps, attackers can inflate the monetary supply beyond the intended emission schedule. This poses a significant threat to the integrity and economic stability of the Nimiq blockchain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains control of a block-producing validator node within the Nimiq blockchain network.</li>
<li>The attacker crafts a malicious block.</li>
<li>The malicious block is created with a timestamp set arbitrarily far into the future.</li>
<li>The vulnerable timestamp validation logic in Nimiq-blockchain (versions 1.3.0 and earlier) fails to detect the out-of-bounds timestamp due to the missing upper bound check.</li>
<li>The malicious block is accepted and added to the blockchain.</li>
<li>The inflated timestamp is used in reward calculations via <code>Policy::supply_at()</code> and <code>batch_delay()</code> functions in <code>blockchain/src/reward.rs</code>.</li>
<li>The attacker receives an unfairly large block reward due to the manipulated timestamp.</li>
<li>The total monetary supply of Nimiq is inflated beyond the intended emission schedule, devaluing existing holdings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-40093 can lead to a significant inflation of the Nimiq cryptocurrency supply. While the precise number of affected users or specific financial losses is currently unknown, any validator capable of producing blocks could potentially exploit this vulnerability. If successful, this attack undermines the economic model of Nimiq, potentially causing a loss of confidence in the cryptocurrency and a devaluation of existing holdings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>nimiq-blockchain</code> that includes a proper upper bound check on block timestamps to address CVE-2026-40093.</li>
<li>Implement monitoring for sudden and unexpected increases in block rewards, focusing on inconsistencies with the expected emission schedule. This would require detailed knowledge of the blockchain&rsquo;s reward algorithm.</li>
<li>Review and harden the block validation logic within the Nimiq-blockchain implementation to prevent similar timestamp manipulation attacks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>blockchain</category><category>timestamp-manipulation</category><category>inflation</category></item></channel></rss>